Advanced AD Attacks

Golden Ticket Attacks

KRBTGT Service Overview

Service Purpose: The KRBTGT account is a built-in service account used by the Key Distribution Center (KDC) service on domain controllers to encrypt and sign all Ticket Granting Tickets (TGTs).

Why Target KRBTGT: This account's password hash is the master key for all Kerberos authentication in the domain. Compromising it grants unlimited domain access.

Golden Ticket Attack

Purpose: Forge TGTs using the compromised KRBTGT hash to gain persistent, undetectable domain access as any user.

Requirements: KRBTGT NTLM hash, domain SID, domain name

Attack Value: Complete domain access, bypasses password changes, near-undetectable

KRBTGT Hash Extraction

Using Impacket

# Extract KRBTGT hash from domain controller
python3 secretsdump.py <domain>/<username>:<password>@<DC-IP> -just-dc-user krbtgt

# Using NTLM hash authentication
python3 secretsdump.py -hashes :<NTLM-hash> <domain>/<username>@<DC-IP> -just-dc-user krbtgt

Using Mimikatz

Using CrackMapExec

Golden Ticket Creation

Using Impacket

Using Mimikatz

Using Metasploit


Silver Ticket Attacks

Service Principal Names (SPN) Overview

Service Purpose: SPNs uniquely identify service instances for Kerberos authentication. Each service (SQL, HTTP, CIFS) has an associated service account.

Why Target Service Accounts: Service tickets are encrypted with the service account's password hash. Compromising this hash allows forging service tickets.

Silver Ticket Attack

Purpose: Forge service tickets (TGS) using compromised service account hashes to access specific services without contacting the domain controller.

Requirements: Service account NTLM hash, service SPN, domain SID

Attack Value: Service-specific access, stealthier than Golden Tickets, no DC communication

Service Account Hash Extraction

Using Impacket

Using CrackMapExec

Using Metasploit

Silver Ticket Creation and Usage

Using Impacket

Using Mimikatz


DCSync Attacks

Directory Replication Service (DRS) Overview

Service Purpose: DRS allows domain controllers to replicate Active Directory data between each other to maintain consistency across the domain.

Why Target DRS: Accounts with replication rights can request password data from domain controllers, effectively extracting all domain hashes remotely.

DCSync Attack

Purpose: Impersonate a domain controller to request password hashes from other DCs using legitimate replication protocols.

Requirements: Account with "Replicating Directory Changes" and "Replicating Directory Changes All" permissions

Attack Value: Extract all domain password hashes without accessing NTDS.dit file directly

DCSync Execution

Using Impacket

Using Mimikatz

Using CrackMapExec

Granting DCSync Permissions

Using Impacket

Using PowerView


DCShadow Attacks

Domain Controller Registration Overview

Service Purpose: Domain controllers register themselves in Active Directory to participate in replication. This registration process can be abused to inject malicious changes.

Why Target Registration: By temporarily registering as a domain controller, attackers can push arbitrary changes to Active Directory that appear legitimate.

DCShadow Attack

Purpose: Register a rogue domain controller to inject undetectable changes into Active Directory.

Requirements: High privileges (Enterprise/Domain Admin), Windows Server with AD DS capability, multi-DC environment

Attack Value: Persistent backdoors, undetectable directory modifications, bypass security monitoring

DCShadow Implementation

Using Mimikatz (Primary Method)

Common DCShadow Targets


Skeleton Key Attacks

Local Security Authority (LSA) Overview

Service Purpose: The LSA process (LSASS) handles authentication and security policy enforcement on Windows systems, including domain controllers.

Why Target LSA: Patching LSASS memory allows modification of authentication logic without changing actual account passwords.

Skeleton Key Attack

Purpose: Patch LSASS on domain controllers to accept a master password for any domain account while maintaining normal authentication.

Requirements: Administrative access to domain controller, memory patching capability

Attack Value: Universal backdoor password, maintains stealth, works until reboot

Skeleton Key Implementation

Using Mimikatz

Using Metasploit

Testing Skeleton Key Access

Using Various Tools


AdminSDHolder Abuse

AdminSDHolder Mechanism Overview

Service Purpose: AdminSDHolder is a special AD object that acts as a template for protecting high-privilege accounts. The SDProp process runs hourly to reset ACLs on protected accounts based on AdminSDHolder's ACL.

Why Target AdminSDHolder: Modifying its ACL grants persistent permissions to all protected accounts (Domain Admins, Enterprise Admins, etc.).

AdminSDHolder Abuse Attack

Purpose: Modify AdminSDHolder's ACL to maintain persistent administrative permissions that survive permission resets.

Requirements: Write permissions to AdminSDHolder object

Attack Value: Persistent privilege escalation, survives ACL resets, stealthy persistence mechanism

AdminSDHolder Modification

Using Impacket

Using PowerView

Using Native Windows Tools

Exploiting AdminSDHolder Permissions

Post-SDProp Exploitation


Integrated Advanced Attack Strategy

Progressive Domain Compromise

Attack Persistence Matrix

Attack Type
Persistence Duration
Detection Difficulty
Access Scope
Tool Options

Golden Ticket

Until KRBTGT reset (years)

Very High

Complete Domain

Impacket, Mimikatz, Metasploit

Silver Ticket

Until service password change

High

Specific Services

Impacket, Mimikatz

DCSync

Until permissions revoked

Medium

Password Extraction

Impacket, Mimikatz, CrackMapExec

DCShadow

Permanent until cleanup

Very High

Directory Modifications

Mimikatz (Windows only)

Skeleton Key

Until DC reboot

Medium

All Domain Accounts

Mimikatz, Metasploit

AdminSDHolder

Until manual cleanup

High

Protected Accounts

Impacket, PowerView, Native Tools

Critical Success Indicators

  • Golden Ticket: Domain-wide access with forged authentication

  • Silver Ticket: Service access without domain controller communication

  • DCSync: Remote extraction of all domain credentials

  • DCShadow: Undetectable directory modifications and persistent backdoors

  • Skeleton Key: Universal backdoor authentication method

  • AdminSDHolder: Persistent permissions over high-privilege accounts

These advanced techniques represent complete Active Directory compromise, providing multiple persistence mechanisms and stealth capabilities that can maintain access for extended periods while offering flexibility in tool choice and implementation methods.

Last updated

Was this helpful?